Book resource access control method based on Chinese remainder theorem

A Chinese remainder theorem and resource access technology, applied in the field of book resource access control based on Chinese remainder theorem, can solve problems such as easy exposure of personal identity information, reduction of computing and communication overhead, and inability to flexibly protect sensitive data.

Active Publication Date: 2020-07-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005]In the process of identity authentication for existing information resource sharing methods, personal identity information is easily exposed, sensitive data cannot be flexibly protected, and access rights of resource access terminals in the domain cannot be determined To solve the technical problem, the present invention proposes an access control method based on the Chinese remainder theorem, which adopts identity authentication technology with hidden attributes to realize identity authentication in the identity authentication process of resource information sharing while protecting personal privacy well, and adopts Attribute parameter matching divides access rights technology, which reduces the calculation and communication overhead of each participant, adopts joint authentication of identity and attribute rights, and avoids collusion attacks by terminals without rights

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Book resource access control method based on Chinese remainder theorem
  • Book resource access control method based on Chinese remainder theorem
  • Book resource access control method based on Chinese remainder theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] In the case of complex information sharing, the book resource authentication center in the domain needs to authenticate the identity of the information sharing members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who comply with access control policies can share information. In view of this application background, the present invention proposes an access control method based on the Chinese remainder theorem, such as figure 1 As shown, the steps are as follows: ①Resource access terminals participating in information resource sharing first perform parameter initialization to generate their own public / private key pairs; ②Registration of resource ...

Embodiment 2

[0095] An access control method based on the Chinese remainder theorem, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of resource access terminals participating in information resource sharing is 10, and the entity set of resource access terminals is expressed as The set of corresponding resource access terminal identities is expressed as Book resource certification center CA defines the attribute set of all resource access terminals as Attr={A 1 ,A 2 ,A 3}, resource access terminal u i The attribute set is attr i ={a i,1 ,a i,2 ,a i,3}, 1≤i≤10, resource access terminal u k The attribute set is attr k ={a k,1 ,a k,2}, 1≤k≤10, k≠i. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a book resource access control method based on the Chinese remainder theorem. The book resource access control method comprises the steps that a book resource authentication center and a resource access terminal generate respective public and private key pairs; the resource access terminals interact with the book resource authentication center to perform attribute identity authentication, and each resource access terminal sends attribute parameters to the book resource authentication center, verifies the attribute parameters and sends the attribute parameters to the resource storage platform; the resource access terminal encrypts the shared resource information into a ciphertext and uploads the ciphertext to the resource storage platform; and the resource access terminal determines a ciphertext resource to be checked according to the ciphertext, the resource storage platform verifies the identity of the ciphertext resource and opens an access link of the ciphertext resource, and the resource access terminal downloads the ciphertext for decryption. Personal privacy is protected by adopting ciphertext attribute authentication, access permission is set by applying an attribute matching access control strategy to guarantee safety of resource sharing, collusion attacks are prevented by adopting identity and attribute permission dual authentication, and book resource sharing in the Internet of Things is more flexible, efficient and practical.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a book resource access control method based on the Chinese remainder theorem. Background technique [0002] The rapid development and continuous innovation of computer technology and the Internet of Things have improved the efficiency of information storage and real-time exchange. But the ensuing computer information security issues are also increasingly revealed, and more and more people pay more attention to information security issues while enjoying the convenience. Access control is one of the cornerstone technologies of data information protection, which can ensure that data can only be accessed by users with corresponding permissions. Set access control policies to divide access rights, obtain information access rights through attribute parameter matching, and use different attribute parameters to access data information with different degrees of sensitivity, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0869H04L9/0819H04L63/0428H04L63/06H04L63/0876H04L63/10
Inventor 王锐芳梁文静李永娇赵坤园张俊松袁俊岭李健勇甘勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products